Resources
Knowledge, not marketing
We publish material that our own operators and CISOs actually use: playbooks, checklists, concise intelligence briefs and regulatory guidance.
Operational playbooks
Operator-level runbooks that describe the exact steps our teams take in the first 24 hours of a major incident or red team finding.
- · „First 24 hours after a ransomware detonation in a regional bank.“
- · „Containment playbook for business e-mail compromise with payment fraud exposure.“
- · „Cloud account takeover: minimal viable actions for security and finance teams.“
Intelligence briefs
Condensed threat intelligence for executives who need the business impact of complex activity without jargon.
- · Ransomware trends in Central and Eastern Europe and what they mean for mid-size organisations.
- · Targeted extortion against logistics, transport and critical suppliers in the region.
- · Realistic threat models for financial institutions and payment-heavy businesses.
Executive checklists
Board-ready checklists that help non-technical leaders ask disciplined, concrete questions.
- · „What to ask your CISO after a major incident – a practical agenda for the first board session.“
- · „Vendor due diligence shortcuts that still respect your risk appetite and regulation.“
- · „Cloud security posture: ten questions that actually change how teams work.“
Compliance & regulation briefings
Guidance on GDPR, DORA and NIS2 that connects legal language with concrete technical and organisational controls.
- · GDPR: mapping real data flows and technical measures, not just paper policies.
- · DORA: making incident response, testing and reporting requirements work with your existing teams.
- · NIS2: prioritising investments for operators of essential and important entities.
Templates & working aids
Pragmatic artefacts that security and risk teams can adapt in hours, not weeks.
- · Incident briefing template for boards and regulators.
- · Tabletop exercise scenarios tailored to banks, fintechs and critical infrastructure.
- · Risk register examples aligned with cyber, operational and regulatory risk.